Difference between revisions of "PwnPie"

From The iPhone Wiki
Jump to: navigation, search
m
(Requirements)
Line 9: Line 9:
   
 
== Requirements ==
 
== Requirements ==
* [[XPwn]]: [http://www.megaupload.com/?d=J9A84LP7 MegaUpload.com]
+
* [[XPwn]]: [https://github.com/planetbeing/xpwn GitHub]
 
* [[IRecovery]]: [http://cl.ly/38TE CloudApp]
 
* [[IRecovery]]: [http://cl.ly/38TE CloudApp]
 
* [[LibPNG]]: [http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg Ethan.Tira-Thompson.org]
 
* [[LibPNG]]: [http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg Ethan.Tira-Thompson.org]

Revision as of 04:59, 12 April 2012

PwnPie is an outdated IV/Key decrypter for Template:Wp and is designed to be what the nonexistent iKeys is supposed to be.

What it does

  • Basically it takes an IPSW and parses every Img3 inside.
  • Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.

We will have an iDevice in pwned iBSS mode.

  • Using the go aes dec command we find keys/IVs and format them.
  • The tool will also decrypt for you the rootfs inside of the IPSW, so you can play with it easily.

Requirements

Notes

  • This app is outdated, PyPie is recommended.